<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Access rule and NAT in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/access-rule-and-nat/m-p/2369097#M271827</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sagar &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 4.79.205.89 22 192.168.10.1 22 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_in permit tcp any host 4.79.205.89 eq ssh &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;couple of points - &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) i have assumed that 192.168.10.1 is reachable from the inside interface &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) if you already have an acl applied to the outside interface then change the name of the acl in the above. If you don't have an acl applied to the outside interface you need to add this additional command - &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group outside_in in interface outside &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 09 Jan 2014 21:20:36 GMT</pubDate>
    <dc:creator>Jon Marshall</dc:creator>
    <dc:date>2014-01-09T21:20:36Z</dc:date>
    <item>
      <title>Access rule and NAT</title>
      <link>https://community.cisco.com/t5/network-security/access-rule-and-nat/m-p/2369092#M271810</link>
      <description>&lt;P&gt;I have cisco ASA 5510 and am using ASDM&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am new to ASA and&amp;nbsp; am trying t understand on what to do for the below &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. I have public ip 4.79.205.89&amp;nbsp; ---------&amp;gt; FW------&amp;gt; 192.168.10.1 ( Apool interface )&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for this to work would i need an Access rule and NAT&amp;nbsp; rule both ? i need to open up the port for tcp. If something is being sent out of 192.168.10.1 i need to do NAT to 4.79.205.89&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i have 2 interface external and Apool (192.168.10) and spool 192.168.30 network&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;a) NAT rule will be for interface Apool&amp;nbsp; correct? is the static NAT 2 way ? meaning &lt;/P&gt;&lt;P&gt;how the traffic comming from outside knows that it will need to go to 192.168.10.1&lt;/P&gt;&lt;P&gt;if i set the NAT rule below it seems that whatever is sent from 192.168.10.1 the ip needs to translate to 4.79.205.89 but how does it know that the traffic from outside sent to 4.79.205.89 needs to go to 192.168.10.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface: App pool&lt;/P&gt;&lt;P&gt;source: 192.168.10.1&lt;/P&gt;&lt;P&gt;Translated:&lt;/P&gt;&lt;P&gt;interface: external&lt;/P&gt;&lt;P&gt;destinition: 4.79.205.89&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;b) how do i allow traffic from public ip to communicate with 192.168.10 which is behind FW &lt;/P&gt;&lt;P&gt;I added Acceses rule for interface external&lt;/P&gt;&lt;P&gt;Action:permit&lt;/P&gt;&lt;P&gt;source:any&lt;/P&gt;&lt;P&gt;destinition:4.79.205.89&lt;/P&gt;&lt;P&gt;port:tcp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Sagar&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:27:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rule-and-nat/m-p/2369092#M271810</guid>
      <dc:creator>Nimika123</dc:creator>
      <dc:date>2019-03-12T03:27:33Z</dc:date>
    </item>
    <item>
      <title>Access rule and NAT</title>
      <link>https://community.cisco.com/t5/network-security/access-rule-and-nat/m-p/2369093#M271811</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sagar &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What exactly is the TCP port you need to allow&amp;nbsp; ie. what application is on 192.168.10.1 that you want to allow access to from the internet. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have access-list configured on any interfaces already ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What version of software are you using ?&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Jan 2014 20:52:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rule-and-nat/m-p/2369093#M271811</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2014-01-09T20:52:06Z</dc:date>
    </item>
    <item>
      <title>Access rule and NAT</title>
      <link>https://community.cisco.com/t5/network-security/access-rule-and-nat/m-p/2369094#M271812</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi I am using ASDM 6.2&amp;nbsp; i need to enable ssh port 22 it is an sftp server&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Jan 2014 21:05:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rule-and-nat/m-p/2369094#M271812</guid>
      <dc:creator>Nimika123</dc:creator>
      <dc:date>2014-01-09T21:05:48Z</dc:date>
    </item>
    <item>
      <title>Access rule and NAT</title>
      <link>https://community.cisco.com/t5/network-security/access-rule-and-nat/m-p/2369095#M271813</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sagar&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unfortunately i'm not familiar with ASDM. Attached is the config guide for ASDM for setting up static NAT - &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/asdm/6_2/user/guide/nat.html#wp1072634"&gt;http://www.cisco.com/en/US/docs/security/asdm/6_2/user/guide/nat.html#wp1072634&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you would also need to add a rule to the acl applied to your outside interface (assuming you have one) to allow the traffic. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are happy to use the CLI i can supply the actual commands. If you want to do this can you post your current config or tell me which version of software is running on the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Jan 2014 21:11:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rule-and-nat/m-p/2369095#M271813</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2014-01-09T21:11:54Z</dc:date>
    </item>
    <item>
      <title>Access rule and NAT</title>
      <link>https://community.cisco.com/t5/network-security/access-rule-and-nat/m-p/2369096#M271815</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Here is the show version&lt;/P&gt;&lt;P&gt;Result of the command: "show version"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco Adaptive Security Appliance Software Version 8.2(1) &lt;/P&gt;&lt;P&gt;Device Manager Version 6.2(5)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Compiled on Tue 05-May-09 22:45 by builders&lt;/P&gt;&lt;P&gt;System image file is "disk0:/asa821-k8.bin"&lt;/P&gt;&lt;P&gt;Config file at boot was "startup-config"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;oshac5510fw up 247 days 1 hour&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hardware:&amp;nbsp;&amp;nbsp; ASA5510, 256 MB RAM, CPU Pentium 4 Celeron 1600 MHz&lt;/P&gt;&lt;P&gt;Internal ATA Compact Flash, 256MB&lt;/P&gt;&lt;P&gt;Slot 1: ATA Compact Flash, 512MB&lt;/P&gt;&lt;P&gt;BIOS Flash M50FW080 @ 0xffe00000, 1024KB&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Jan 2014 21:15:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rule-and-nat/m-p/2369096#M271815</guid>
      <dc:creator>Nimika123</dc:creator>
      <dc:date>2014-01-09T21:15:12Z</dc:date>
    </item>
    <item>
      <title>Re: Access rule and NAT</title>
      <link>https://community.cisco.com/t5/network-security/access-rule-and-nat/m-p/2369097#M271827</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sagar &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 4.79.205.89 22 192.168.10.1 22 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_in permit tcp any host 4.79.205.89 eq ssh &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;couple of points - &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) i have assumed that 192.168.10.1 is reachable from the inside interface &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) if you already have an acl applied to the outside interface then change the name of the acl in the above. If you don't have an acl applied to the outside interface you need to add this additional command - &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group outside_in in interface outside &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Jan 2014 21:20:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rule-and-nat/m-p/2369097#M271827</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2014-01-09T21:20:36Z</dc:date>
    </item>
    <item>
      <title>Re: Access rule and NAT</title>
      <link>https://community.cisco.com/t5/network-security/access-rule-and-nat/m-p/3760291#M271829</link>
      <description>&lt;P&gt;&lt;SPAN&gt;If you add another ethernet interface, let's say a USB one, and manually configure it with an IP, say 192.168.10.1 - check &lt;A href="https://www.routerinstructions.com/192-168-10-1/" target="_self"&gt;this link&lt;/A&gt;, the same thing happens above with free routes. Assumne you assigned the USB ethernet adapter 192.168.10.1 with subnet mask /24 (or 255.255.255.0).&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 09 Dec 2018 20:05:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rule-and-nat/m-p/3760291#M271829</guid>
      <dc:creator>jimsmith</dc:creator>
      <dc:date>2018-12-09T20:05:56Z</dc:date>
    </item>
    <item>
      <title>Re: Access rule and NAT</title>
      <link>https://community.cisco.com/t5/network-security/access-rule-and-nat/m-p/3761045#M271830</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;you need to have a port forward NAT rule and ACL for this. hope below link help with it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113024-asa-82-port-forward-00.html#pat" target="_self"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113024-asa-82-port-forward-00.html#pat&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;good luck&lt;/P&gt;</description>
      <pubDate>Tue, 11 Dec 2018 06:21:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-rule-and-nat/m-p/3761045#M271830</guid>
      <dc:creator>Kasun Bandara</dc:creator>
      <dc:date>2018-12-11T06:21:00Z</dc:date>
    </item>
  </channel>
</rss>

